Empirical Investigation of Cloud, Grid and Virtualization Using Compiler Optimization Level for Threads Processes
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 5
Abstract
This research focused on the implementation of Open MP. It considers the parallelization of an application code that simulates the thermal gradient of material in two dimensions. A C language program code called jacobi2d.c that solves a rectangular 2-dimensional heat conductivity problem using Jacobi iterative method was used. The boundary conditions required to compute a temperature distribution for a rectangular 2D problem are: Top 300C, Bottom 500C, Left 400C and Right 900C with a range of problem sizes enter as a run-time parameter to alter the problem sizes and convergence criteria. Also, there were computations and readings for iterations and runtime for four values of M and N which were selected for 01, 02, and 03 optimizations. In Table 1 Readings, four values were selected for each of the iterations. The results show the performance of the runtime as the processor increases from 01-optimization, to 02-optimization and finally to 03-optimization. It can be deduced from the representation that the run time of the values reduces as more resources are allocated to execution through the increase in optimization level. Also, in Table 2 Readings, the runtime decreases as it moves from thread1, thread2, thread3, and thread4, comparing the last values for thread1 which are M is 180, N is 200, and their runtime which is 42.797187001. Also the last values for thread2 which are M is 180, N is 200, their runtime which is 21.772106003. When the two runtimes were compared, it was discovered that there was a decrease in the runtime because the more the thread increases, the more system resources they share such as a processor which may affect their runtime by increasing it.
Authors and Affiliations
Solanke Ilesanmi, Alomaja Victor Ojumu, Ajayi Abiodun Folurera and Ajao Aisha Omorinbola
Detecting and Preventing ARP Spoofing Attacks Using Real-Time Data Analysis and Machine Learning
ARP spoofing attacks contain certain risks in networks as they seem to intercept traffic and can lead the leakage of intellectual information. This research paper focuses on enhancing the method through which five algori...
A Review of Data Mining Techniques and Its Applications
Knowledge Discovery in Databases (KDD) is another name for data mining. It's also known as the process of extracting interpretable, intriguing and valuable statistics from unstructured data. There are a variety of resour...
Smart Gate Pass Security Management System Using Random Key Generation
Gate pass management system relates to the act of security. This system can be used to speed up the visitor registration which will notify the presence of visitors in the organisation. This can be used to replace the tra...
Combinations, Contradictions, And Cross Fertilization in Actor-Network Theory and Assemblage Thinking
This paper shows that assembling thought as well as actor-network theory (ANT) have such a great deal in common than the debate suggests. It proposes three cross-fertilizations depending on intersections as well as disju...
An Analysis of Digital Image Processing Techniques
Image processing is process of modifying nature of an image in order to improve its visual information about human interpretations & autonomously machine detection. Digital image processing is subset of electronics re...